fix(output): normalize severity values to prevent HTML report failure #4786
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Fixes #4392 where the HTML report generator fails due to unexpected severity values like
"HIGH-EXPLOIT"
. The error occurs because the severity key is not recognized inSEVERITY_TYPES_COLOR
, leading to aKeyError
.Solution
normalize_severity()
function to standardize severity values before processing."HIGH-EXPLOIT"
) are mapped to their base severities ("HIGH"
).cve_severity
counters.cve_data["cves"]
.Previously, this failed due to an unknown severity. With this fix, it now processes correctly.
Testing
"HIGH-EXPLOIT"
,"CRITICAL-RISK"
, and"LOW-VULNERABILITY"
.